• Title/Summary/Keyword: false alarms

Search Result 199, Processing Time 0.024 seconds

Autoencoder Based Fire Detection Model Using Multi-Sensor Data (다중 센서 데이터를 활용한 오토인코더 기반 화재감지 모델)

  • Taeseong Kim;Hyo-Rin Choi;Young-Seon Jeong
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.23-32
    • /
    • 2024
  • Large-scale fires and their consequential damages are becoming increasingly common, but confidence in fire detection systems is waning. Recently, widely-used chemical fire detectors frequently generate lots of false alarms, while video-based deep learning fire detection is hampered by its time-consuming and expensive nature. To tackle these issues, this study proposes a fire detection model utilizing an autoencoder approach. The objective is to minimize false alarms while achieving swift and precise fire detection. The proposed model, employing an autoencoder methodology, can exclusively learn from normal data without the need for fire-related data, thus enhancing its adaptability to diverse environments. By amalgamating data from five distinct sensors, it facilitates rapid and accurate fire detection. Through experiments with various hyperparameter combinations, the proposed model demonstrated that out of 14 scenarios, only one encountered false alarm issues. Experimental results underscore its potential to curtail fire-related losses and bolster the reliability of fire detection systems.

A Combination of Signature-based IDS and Machine Learning-based IDS using Alpha-cut and Beta pick (Alpha-cut과 Beta-pick를 이용한 시그너쳐 기반 침입탐지 시스템과 기계학습 기반 침입탐지 시스템의 결합)

  • Weon, Ill-Young;Song, Doo-Heon;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.609-616
    • /
    • 2005
  • Signature-based Intrusion Detection has many false positive and many difficulties to detect new and changed attacks. Alpha-cut is introduced which reduces false positive with a combination of signature-based IDS and machine learning-based IDS in prior paper [1]. This research is a study of a succession of Alpha-cut, and we introduce Beta-rick in which attacks can be detected but cannot be detected in single signature-based detection. Alpha-cut is a way of increasing detection accuracy for the signature based IDS, Beta-pick is a way which decreases the case of treating attack as normality. For Alpha-cut and Beta-pick we use XIBL as a learning algorithm and also show the difference of result of Sd.5. To describe the value of proposed method we apply Alpha-cut and Beta-pick to signature-based IDS and show the decrease of false alarms.

Detection of False Data Injection Attacks in Wireless Sensor Networks (무선 센서 네트워크에서 위조 데이터 주입 공격의 탐지)

  • Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.83-90
    • /
    • 2009
  • Since wireless sensor networks are deployed in open environments, an attacker can physically capture some sensor nodes. Using information of compromised nodes, an attacker can launch false data injection attacks that report nonexistent events. False data can cause false alarms and draining the limited energy resources of the forwarding nodes. In order to detect and discard such false data during the forwarding process, various security solutions have been proposed. But since they are prevention-based solutions that involve additional operations, they would be energy-inefficient if the corresponding attacks are not launched. In this paper, we propose a detection method that can detect false data injection attacks without extra overheads. The proposed method is designed based on the signature of false data injection attacks that has been derived through simulation. The proposed method detects the attacks based on the number of reporting nodes, the correctness of the reports, and the variation in the number of the nodes for each event. We show the proposed method can detect a large portion of attacks through simulation.

Efficient Attack Traffic Detection Method for Reducing False Alarms (False Alarm 감축을 위한 효율적인 공격 트래픽 탐지 기법)

  • Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.65-75
    • /
    • 2009
  • The development of IT technology, Internet popularity is increasing geometrically. However, as its side effect, the intrusion behaviors such as information leakage for key system and infringement of computation network etc are also increasing fast. The attack traffic detection method which is suggested in this study utilizes the Snort, traditional NIDS, filters the packet with false positive among the detected attack traffics using Nmap information. Then, it performs the secondary filtering using nessus vulnerability information and finally performs correlation analysis considering appropriateness of management system, severity of signature and security hole so that it could reduce false positive alarm message as well as minimize the errors from false positive and as a result, it raised the overall attack detection results.

Evaluation of Source Identification Method Based on Energy-Weighting Level with Portal Monitoring System Using Plastic Scintillator

  • Lee, Hyun Cheol;Koo, Bon Tack;Choi, Chang Il;Park, Chang Su;Kwon, Jeongwan;Kim, Hong-Suk;Chung, Heejun;Min, Chul Hee
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.3
    • /
    • pp.117-129
    • /
    • 2020
  • Background: Radiation portal monitors (RPMs) involving plastic scintillators installed at the border inspection sites can detect illicit trafficking of radioactive sources in cargo containers within seconds. However, RPMs may generate false alarms because of the naturally occurring radioactive materials. To manage these false alarms, we previously suggested an energy-weighted algorithm that emphasizes the Compton-edge area as an outstanding peak. This study intends to evaluate the identification of radioactive sources using an improved energy-weighted algorithm. Materials and Methods: The algorithm was modified by increasing the energy weighting factor, and different peak combinations of the energy-weighted spectra were tested for source identification. A commercialized RPM system was used to measure the energy-weighted spectra. The RPM comprised two large plastic scintillators with dimensions of 174 × 29 × 7 ㎤ facing each other at a distance of 4.6 m. In addition, the in-house-fabricated signal processing boards were connected to collect the signal converted into a spectrum. Further, the spectra from eight radioactive sources, including special nuclear materials (SNMs), which were set in motion using a linear motion system (LMS) and a cargo truck, were estimated to identify the source identification rate. Results and Discussion: Each energy-weighted spectrum exhibited a specific peak location, although high statistical fluctuation errors could be observed in the spectrum with the increasing source speed. In particular, 137Cs and 60Co in motion were identified completely (100%) at speeds of 5 and 10 km/hr. Further, SNMs, which trigger the RPM alarm, were identified approximately 80% of the time at both the aforementioned speeds. Conclusion: Using the modified energy-weighted algorithm, several characteristics of the energy weighted spectra could be observed when the used sources were in motion and when the geometric efficiency was low. In particular, the discrimination between 60Co and 40K, which triggers false alarms at the primary inspection sites, can be improved using the proposed algorithm.

A neck healthy warning algorithm for identifying text neck posture prevention (거북목 자세를 예방하기 위한 목 건강 경고 알고리즘)

  • Jae-Eun Lee;Jong-Nam Kim;Hong-Seok Choi;Young-Bong Kim
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.3
    • /
    • pp.115-122
    • /
    • 2022
  • With the outbreak of COVID-19 a few years ago, video conferencing and electronic document work have increased, and for this reason, the proportion of computer work among modern people's daily routines is increasing. However, as more and more people work on computers in the wrong posture for a long time, the number of patients with poor eyesight and text neck is increasing. Until recently, many studies have been published to correct posture, but most of them have limitations that users may experience discomfort because they have to correct posture by wearing equipment. A posture correction sensor algorithm is proposed to prevent access to the minimum distance between a computer monitor and a person using an ultrasonic sensor device. At this time, an algorithm for minimizing false alarms among warning alarms that sound at the minimum distance is also proposed. Because the ultrasonic sensor device is used, posture correction can be performed without attaching a device to the body, and the user can relieve discomfort. In addition, experimental results showed that accuracy can be improved by reducing false alarms by removing more than half of the noise generated during distance measurement.

Test Bed Design of Fire Detection System Based on Multi-Sensor Information for Reduction of False Alarms (화재감지 오보 감소를 위한 다중정보기반 시스템의 Test Bed 설계)

  • Lee, Kijun;Kim, Hyeong Gweon;Lee, Bong Woo;Kim, Tae-Ok;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.6
    • /
    • pp.107-114
    • /
    • 2012
  • Fire detection system is used for detection and alarm-generation of danger in case of fire. Most fire detection systems being used these days often malfunction from false positive and false negative errors. To improve detection reliability, an integrated fire detection algorithm using multi-senor information of heat, smoke and carbon monoxide detectors is suggested, then built and tested using the LabVIEW environment. Simulated using sensor measurement data offered by National Institute of Standards and Technology (NIST), possibility of reducing false positive and false negative errors is verified.

Performance Prediction of Multiple Hypothesis Tracking Algorithm (다중 가설 추적 알고리듬의 추적 성능예측)

  • 정영헌
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2787-2790
    • /
    • 2003
  • In this paper, we predict tracking performance of the multiple hypothesis tracking (MHT) algorithm. The MHT algorithm is known to be an optimal Bayesian approach and is superior to asly other tracking filters because it takes into account the events that the measurements can be originated from new targets and false alarms 3s well as interesting targets. In the MHT algorithm, a number of candidate hypotheses are generated and evaluated later as more data are received. The probability of each candidate hypotheses is approximately evaluated by using the hybrid conditional average approach (HYCA). We performed numerical experiments to show the validity of our performance prediction.

  • PDF

Statistical Design of VSS $\overline{A}$ Charts for Monitoring an AR(1) Process (AR(l) 공정을 탐지하는 VSS $\overline{A}$ 관리도의 통계적 설계)

  • 이재헌
    • Journal of Korean Society for Quality Management
    • /
    • v.31 no.3
    • /
    • pp.126-135
    • /
    • 2003
  • A basic assumption in standard applications of control charts is that the observations are statistically independent. However, this assumption is often violated from processes in many industries. The presence of autocorrelation has a serious impact on the performance of control charts, causing a dramatic increase in the frequency of false alarms. This paper considers a process in which the observations can be modeled as a first order autoregressive(AR(1)) process, and develops (equation omitted) charts with the variable sample size(VSS) scheme for monitoring the mean of this process.

Implementation of the Automatic Speech Editing System Using Keyword Spotting Technique (핵심어 인식을 이용한 음성 자동 편집 시스템 구현)

  • Chung, Ik-Joo
    • Speech Sciences
    • /
    • v.3
    • /
    • pp.119-131
    • /
    • 1998
  • We have developed a keyword spotting system for automatic speech editing. This system recognizes the only keyword 'MBC news' and then sends the time information to the host system. We adopted a vocabulary dependent model based on continuous hidden Markov model, and the Viterbi search was used for recognizing the keyword. In recognizing the keyword, the system uses a parallel network where HMM models are connected independently and back-tracking information for reducing false alarms and missing. We especially focused on implementing a stable and practical real-time system.

  • PDF